We face risks associated with security breaches through cyber attacks or cyber intrusions over the Internet, malware, ransomware, computer viruses, attachments to e-mails, persons inside our organization or persons with access to systems inside our organization, and other significant disruptions of IT networks and related systems owned or used by us. The risk of a security breach or disruption, particularly through cyber attack or cyber intrusion, including by computer hackers, foreign governments and cyber terrorists, has generally increased as the number, intensity and sophistication of attempted attacks and intrusions from around the world have increased. Our IT networks and related systems are essential to the operation of our business and our ability to perform day-to-day operations (including managing our building systems) and, in some cases, may be critical to the operations of certain customers of ours. Although we make efforts to maintain the security and integrity of these types of IT networks and related systems and have implemented various measures to manage the risk of a cybersecurity incident, there can be no assurance that our security efforts and measures will be effective or that attempted security breaches or disruptions would not be successful or damaging. Even the most well protected information, networks, systems and facilities remain potentially vulnerable because the techniques used in such attempted security breaches evolve and are not generally recognized until launched against a target, and in some cases are designed not to be detected and, in fact, may not be detected. Accordingly, we may be unable to anticipate these techniques or implement adequate security barriers or other preventative measures, and thus it is impossible for us to entirely mitigate cybersecurity risks.
A cybersecurity incident involving IT networks and related systems owned or used by us could:
- disrupt the proper functioning of our networks and systems and therefore our operations and/or our customers' operations;- result in misstated financial reports, violations of loan covenants, missed reporting deadlines and/or missed permitting deadlines;- result in our inability to properly monitor our compliance with the rules and regulations regarding our qualification as a REIT;- result in the unauthorized access to, and destruction, loss, theft, misappropriation or release of, proprietary, confidential, sensitive or otherwise valuable information, which hackers could use to compete against us or expose us to damage claims by third-parties for disruptive, destructive or otherwise harmful purposes and outcomes;- result in our inability to maintain the building systems relied upon by our customers for the efficient use of their leased space;- require significant management attention and resources to remedy any damages that result;- subject us to claims for breach of contract, damages, credits, penalties or termination of leases or other agreements; or - damage our reputation among our customers and investors generally.
Any or all of the foregoing could have a material adverse effect on our results of operations, financial condition and cash flows.